Internal

Forensic Challenge 2010

our first Scan of the Month Challenge in 2010 is over! We received 91 submissions in total, and some parts of the solutions are so interesting that I would like to publicly highlight them in this post. Now that the winners are announced (Congratulations Ivan, Franck, and Tareq!), I think I also owe you an explanation why we asked the specific questions and what we expected as answers. I am sure you will be surprised how many pieces of information you can dig up in a plain pcap - I was indeed when I had a look at the solutions we received. Enjoy! Read more »

We have just posted the first challenge of the Forensic Challenge 2010. The first challenge deals with a network attack. It has been provided by Tillmann Werner from the Giraffe Chapter. It is accessible at https://honeynet.org/node/504. Submissions are due on Monday, February 1st 2010 and results will be released on Monday, February 15th 2010. The top three submissions will be awarded with small prizes. Check it out!

Forensic Challenge 2010

Challenge 1 - pcap attack trace - (provided by Tillmann Werner from the Giraffe Chapter) is to investigate a network attack.
Send submissions (please use the MS word submission template or the Open Office submission template) [email protected] no later then 17:00 EST, Monday, February 1st 2010. Results will be released on Monday, February 15th 2010. Small prizes will be awarded to the top three submissions.

Skill Level: Intermediate

The Challenge:
A network trace with attack data is provided. (Note that the IP address of the victim has been changed to hide the true location.) Analyze and answer the following questions:

Which systems (i.e. IP addresses) are involved? (2pts)

What can you find out about the attacking host (e.g., where is it located)? (2pts)

How many TCP sessions are contained in the dump file? (2pts)

How long did it take to perform the attack? (2pts)

Which operating system was targeted by the attack? And which service? Which vulnerability? (6pts)

Can you sketch an overview of the general actions performed by the attacker? (6pts)

What specific vulnerability was attacked? (2pts)

What actions does the shellcode perform? Pls list the shellcode. (8pts)

Do you think a Honeypot was used to pose as a vulnerable victim? Why? (6pts)

Was there malware involved? Whats the name of the malware? (We are not looking for a detailed malware analysis for this challenge) (2pts)